From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-yb1-f175.google.com (mail-yb1-f175.google.com [209.85.219.175]) by mx.groups.io with SMTP id smtpd.web09.8376.1611920903150406339 for ; Fri, 29 Jan 2021 03:48:23 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@linaro.org header.s=google header.b=TMGYx/F2; spf=pass (domain: linaro.org, ip: 209.85.219.175, mailfrom: ilias.apalodimas@linaro.org) Received: by mail-yb1-f175.google.com with SMTP id i6so2275122ybq.5 for ; Fri, 29 Jan 2021 03:48:23 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=EhoHXYhD0BBnzCJ7vYUIbDaIVRvcF0T/nzu1uQVtaDc=; b=TMGYx/F20L0NZxrc5fKQlJCiG9C0mEw4dgpR31WOpc7rt6fScEL9Y32r1NvNiASOKK KFWhiSqWvZweC8B47pbOO8kLm1aKS22mx+0kfnX/7rhHZPUyQv+O28duU8Qxjpg6CAsX mi/8QnM40Bi5x8vOziHC/7yuX49kKMPoQKROEqQCsVF7JlA1oC+6d1T4ZzuUHbSftYi6 bErumFaOQswEGTVzHft1K/i7N7M7q16LVzX+QPYrY1oh82wecj02FhyS5DdajmC46gYM wwfjk7adZ+8Zx+xZbRPERgYrsPw3AZeIZJsyzCzsbRTwi+I5rtZ73U9PxKeUJeoa4oPx USew== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=EhoHXYhD0BBnzCJ7vYUIbDaIVRvcF0T/nzu1uQVtaDc=; b=pvK1nSBk69pjDk415BfO06q4eOnoAvH3Dr6InEoo7ujLnqqXsAagolsBMSpXJEG5R7 8kr37tazOcrfdVsJsUqi3NOWUp9nLorh2jmafOuhhfTOCtOYUJSDuX5MmPCfjq5Bmz+H RikNI41o7ytME+CA3ZTUEtqAd1rQPJ4Px2rZoC3VgiALW96Wh+l9htDRVqjwx1Gyp+9J tey6lTIKSexh2PnQvBI2aFY+lLschEwSjVXVhjAP29o+Uo9zAWGjwtkiYME94IG/fL/K GTdqfkkZOtU0rb80TFE8scX5PfE6CtOU6FyNQ/yey2xk21AI2TS1gX1DzdBnNR0n8/3I Whxw== X-Gm-Message-State: AOAM532I7m0QtK5uvHxQ8Hw5HaX5kwOTJWHPgFXArc9qMJRu28d/EQfn kbvmB4slwscyKCJzhG2pmk10ErzSE8+fcrbvWfNNPA== X-Google-Smtp-Source: ABdhPJwovvhAq8O8Ov7eHWSPP53lzfm/7U1IoZTZOe/rKEqvj5wnlFuZ4ZBabr+EHqbr8V8SZQtIUOXioDcHOdUIEmY= X-Received: by 2002:a25:357:: with SMTP id 84mr6622171ybd.256.1611920902209; Fri, 29 Jan 2021 03:48:22 -0800 (PST) MIME-Version: 1.0 References: <20201216110903.17995-1-sughosh.ganu@linaro.org> <20201216110903.17995-3-sughosh.ganu@linaro.org> In-Reply-To: From: "Ilias Apalodimas" Date: Fri, 29 Jan 2021 13:47:46 +0200 Message-ID: Subject: Re: [PATCH edk2-platforms v3 2/2] StMMRpmb: Add support for building StandaloneMm image for OP-TEE To: Sami Mujawar Cc: Sughosh Ganu , "devel@edk2.groups.io" , "ardb+tianocore@kernel.org" , Leif Lindholm , Sahil Malhotra , nd Content-Type: text/plain; charset="UTF-8" Thanks Sami, I'll fix the remarks and resend On Fri, 29 Jan 2021 at 12:29, Sami Mujawar wrote: > > Hi Sughosh, > > Please find my response inline marked [SAMI]. > > There are a few minor suggestions, otherwise this patch looks good to me. > With that changed. > > Reviewed-by: Sami Mujawar > > Regards, > > Sami Mujawar > > -----Original Message----- > From: Sughosh Ganu > Sent: 16 December 2020 11:09 AM > To: devel@edk2.groups.io > Cc: Sami Mujawar ; Ard Biesheuvel ; Leif Lindholm ; Sahil Malhotra ; Ilias Apalodimas > Subject: [PATCH edk2-platforms v3 2/2] StMMRpmb: Add support for building StandaloneMm image for OP-TEE > > From: Ilias Apalodimas > > With some recent changes in OP-TEE [1] and U-Boot [2] we can compile StMM > and launch it from an OP-TEE secure partition which is mimicking SPM. > > There's a number of advantages in this approach. In Arm world SPM, > currently used for dispatching StMM, and SPD used for OP-TEE, are > mutually exclusive. Since there's no application in OP-TEE for managing > EFI variables, this means that one can have a secure OS or secure > variable storage. > > By re-using StMM we have EDK2s approved application controlling > variable storage and the ability to run a secure world OS. This also > allows various firmware implementations to adopt EDK2 way of storing > variables (including the FTW implementation), as long as OP-TEE is > available on that given platform (or any other secure OS that can launch > StMM and has a supplicant for handling the RPMB partition). > Another advantage is that OP-TEE has the ability to access an eMMC RPMB > partition to store those variables. This requires a normal world > supplicant, which is implemented in U-Boot currently. The supplicant > picks up the encrypted buffer from OP-TEE and wires it to the eMMC > driver(s). Similar functionality can be added in EDK2 by porting the > supplicant and adapt it to using the native eMMC drivers. > > There's is one drawback in using OP-TEE. The current SPM calls need to run > to completion. This contradicts the current OP-TEE RPC call requirements, > used to access the RPMB storage. Thats leads to two different SMC calls for > entering secure world to access StMM. > > So let's add support for a platform that compiles StMM and an RPMB > driver that communicates with OP-TEE to read/write the variables. > For anyone interested in testing this there's repo that builds all the > sources and works on QEMU [3]. > > [1] https://github.com/OP-TEE/optee_os/pull/3973 > [2] http://u-boot.10912.n7.nabble.com/PATCH-0-7-v4-EFI-variable-support-via-OP-TEE-td412499.html > [3] https://git.linaro.org/people/ilias.apalodimas/efi_optee_variables.git/ > > Signed-off-by: Ilias Apalodimas > --- > > Changes since V2: None > > Platform/StMMRpmb/PlatformStandaloneMm.dsc | 168 ++++++++++++++++++++ > Platform/StMMRpmb/PlatformStandaloneMm.fdf | 111 +++++++++++++ > 2 files changed, 279 insertions(+) > > diff --git a/Platform/StMMRpmb/PlatformStandaloneMm.dsc b/Platform/StMMRpmb/PlatformStandaloneMm.dsc > new file mode 100644 > index 0000000000..93596c0630 > --- /dev/null > +++ b/Platform/StMMRpmb/PlatformStandaloneMm.dsc > @@ -0,0 +1,168 @@ > +# > +# Copyright (c) 2018, ARM Limited. All rights reserved. > +# Copyright (c) 2020, Linaro Ltd. All rights reserved. > +# > +# SPDX-License-Identifier: BSD-2-Clause-Patent > +# > + > +################################################################################ > +# > +# Defines Section - statements that will be processed to create a Makefile. > +# > +################################################################################ > +[Defines] > + PLATFORM_NAME = MmStandaloneRpmb > + PLATFORM_GUID = A27A486E-D7B9-4D70-9F37-FED9ABE041A2 > + PLATFORM_VERSION = 1.0 > + DSC_SPECIFICATION = 0x00010011 > + OUTPUT_DIRECTORY = Build/$(PLATFORM_NAME) > + SUPPORTED_ARCHITECTURES = AARCH64 > + BUILD_TARGETS = DEBUG|RELEASE|NOOPT > + SKUID_IDENTIFIER = DEFAULT > + FLASH_DEFINITION = Platform/StMMRpmb/PlatformStandaloneMm.fdf > + DEFINE DEBUG_MESSAGE = TRUE > + > + # LzmaF86 > + DEFINE COMPRESSION_TOOL_GUID = D42AE6BD-1352-4bfb-909A-CA72A6EAE889 > + > +################################################################################ > +# > +# Library Class section - list of all Library Classes needed by this Platform. > +# > +################################################################################ > +[LibraryClasses] > + ArmSvcLib|ArmPkg/Library/ArmSvcLib/ArmSvcLib.inf > + ArmLib|ArmPkg/Library/ArmLib/ArmBaseLib.inf > + BaseLib|MdePkg/Library/BaseLib/BaseLib.inf > + SafeIntLib|MdePkg/Library/BaseSafeIntLib/BaseSafeIntLib.inf > + VariablePolicyHelperLib|MdeModulePkg/Library/VariablePolicyHelperLib/VariablePolicyHelperLib.inf > + BaseMemoryLib|MdePkg/Library/BaseMemoryLib/BaseMemoryLib.inf > + DebugLib|MdePkg/Library/BaseDebugLibSerialPort/BaseDebugLibSerialPort.inf > + DebugPrintErrorLevelLib|MdePkg/Library/BaseDebugPrintErrorLevelLib/BaseDebugPrintErrorLevelLib.inf > + ExtractGuidedSectionLib|EmbeddedPkg/Library/PrePiExtractGuidedSectionLib/PrePiExtractGuidedSectionLib.inf > + FvLib|StandaloneMmPkg/Library/FvLib/FvLib.inf > + HobLib|StandaloneMmPkg/Library/StandaloneMmCoreHobLib/StandaloneMmCoreHobLib.inf > + IoLib|MdePkg/Library/BaseIoLibIntrinsic/BaseIoLibIntrinsic.inf > + MemLib|StandaloneMmPkg/Library/StandaloneMmMemLib/StandaloneMmMemLib.inf > + MemoryAllocationLib|StandaloneMmPkg/Library/StandaloneMmCoreMemoryAllocationLib/StandaloneMmCoreMemoryAllocationLib.inf > + PcdLib|MdePkg/Library/BasePcdLibNull/BasePcdLibNull.inf > + PeCoffLib|MdePkg/Library/BasePeCoffLib/BasePeCoffLib.inf > + PrintLib|MdePkg/Library/BasePrintLib/BasePrintLib.inf > + VariablePolicyLib|MdeModulePkg/Library/VariablePolicyLib/VariablePolicyLib.inf > + ReportStatusCodeLib|MdePkg/Library/BaseReportStatusCodeLibNull/BaseReportStatusCodeLibNull.inf > + > + # > + # Entry point > + # > + #StandaloneMmCoreEntryPoint|StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/StandaloneMmCoreEntryPoint.inf > [SAMI] This line can be removed. > [/SAMI] > + StandaloneMmCoreEntryPoint|StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/StandaloneMmCoreEntryPoint.inf > + StandaloneMmDriverEntryPoint|MdePkg/Library/StandaloneMmDriverEntryPoint/StandaloneMmDriverEntryPoint.inf > + > + StandaloneMmMmuLib|ArmPkg/Library/StandaloneMmMmuLib/ArmMmuStandaloneMmLib.inf > + #CacheMaintenanceLib|ArmPkg/Library/ArmCacheMaintenanceLib/ArmCacheMaintenanceLib.inf > [SAMI] remove? > [/SAMI] > + CacheMaintenanceLib|MdePkg/Library/BaseCacheMaintenanceLibNull/BaseCacheMaintenanceLibNull.inf > + PeCoffExtraActionLib|StandaloneMmPkg/Library/StandaloneMmPeCoffExtraActionLib/StandaloneMmPeCoffExtraActionLib.inf > + RngLib|MdePkg/Library/BaseRngLibNull/BaseRngLibNull.inf > + > + SerialPortLib|MdePkg/Library/BaseSerialPortLibNull/BaseSerialPortLibNull.inf > + DebugLib|MdePkg/Library/BaseDebugLibNull/BaseDebugLibNull.inf > [SAMI] This appears twice. Can the previous instance be removed? > [/SAMI] > + > + # > + # It is not possible to prevent the ARM compiler for generic intrinsic functions. > + # This library provides the intrinsic functions generate by a given compiler. > + # NULL means link this library into all ARM images. > + # > + NULL|ArmPkg/Library/CompilerIntrinsicsLib/CompilerIntrinsicsLib.inf > + > +[LibraryClasses.common.MM_STANDALONE] > + HobLib|StandaloneMmPkg/Library/StandaloneMmHobLib/StandaloneMmHobLib.inf > + MmServicesTableLib|MdePkg/Library/StandaloneMmServicesTableLib/StandaloneMmServicesTableLib.inf > + MemoryAllocationLib|StandaloneMmPkg/Library/StandaloneMmMemoryAllocationLib/StandaloneMmMemoryAllocationLib.inf > + > + IntrinsicLib|CryptoPkg/Library/IntrinsicLib/IntrinsicLib.inf > + OpensslLib|CryptoPkg/Library/OpensslLib/OpensslLib.inf > + PlatformSecureLib|SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.inf > + SynchronizationLib|MdePkg/Library/BaseSynchronizationLib/BaseSynchronizationLib.inf > + TimerLib|MdePkg/Library/BaseTimerLibNullTemplate/BaseTimerLibNullTemplate.inf > +################################################################################ > +# > +# Pcd Section - list of all EDK II PCD Entries defined by this Platform > +# > +################################################################################ > + > +[PcdsFeatureFlag.common] > + gArmTokenSpaceGuid.PcdFfaEnable|TRUE > + > +[PcdsFixedAtBuild] > + gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel|0x800000CF > + gEfiMdePkgTokenSpaceGuid.PcdDebugPropertyMask|0xff > + gEfiMdePkgTokenSpaceGuid.PcdReportStatusCodePropertyMask|0x0f > + > + gEfiMdePkgTokenSpaceGuid.PcdMaximumGuidedExtractHandler|0x2 > + # Secure Storage > + gEfiSecurityPkgTokenSpaceGuid.PcdUserPhysicalPresence|TRUE > + gEfiMdeModulePkgTokenSpaceGuid.PcdMaxVariableSize|0x2000 > + gEfiMdeModulePkgTokenSpaceGuid.PcdMaxAuthVariableSize|0x2800 > + > + gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize|0x00004000 > + gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingSize|0x00004000 > + gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareSize|0x00004000 > + gEfiMdeModulePkgTokenSpaceGuid.PcdVariableStoreSize|0x00004000 > + > +[PcdsPatchableInModule] > + # Allocated memory for EDK2 uppers layers > + gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableBase|0x0 > + gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingBase|0x0 > + gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareBase|0x0 > + > +################################################################################################### > +# > +# Components Section - list of the modules and components that will be processed by compilation > +# tools and the EDK II tools to generate PE32/PE32+/Coff image files. > +# > +# Note: The EDK II DSC file is not used to specify how compiled binary images get placed > +# into firmware volume images. This section is just a list of modules to compile from > +# source into UEFI-compliant binaries. > +# It is the FDF file that contains information on combining binary files into firmware > +# volume images, whose concept is beyond UEFI and is described in PI specification. > +# Binary modules do not need to be listed in this section, as they should be > +# specified in the FDF file. For example: Shell binary (Shell_Full.efi), FAT binary (Fat.efi), > +# Logo (Logo.bmp), and etc. > +# There may also be modules listed in this section that are not required in the FDF file, > +# When a module listed here is excluded from FDF file, then UEFI-compliant binary will be > +# generated for it, but the binary will not be put into any firmware volume. > +# > +################################################################################################### > +[Components.common] > + # > + # Standalone MM components > + # > + Drivers/OpTeeRpmb/OpTeeRpmbFv.inf > + StandaloneMmPkg/Core/StandaloneMmCore.inf > + StandaloneMmPkg/Drivers/StandaloneMmCpu/AArch64/StandaloneMmCpu.inf > + MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteStandaloneMm.inf { > + > + NULL|Drivers/OpTeeRpmb/FixupPcd.inf > + } > + MdeModulePkg/Universal/Variable/RuntimeDxe/VariableStandaloneMm.inf { > + > + AuthVariableLib|SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf > + BaseCryptLib|CryptoPkg/Library/BaseCryptLib/SmmCryptLib.inf > + DevicePathLib|MdePkg/Library/UefiDevicePathLib/UefiDevicePathLib.inf > + VarCheckLib|MdeModulePkg/Library/VarCheckLib/VarCheckLib.inf > + NULL|MdeModulePkg/Library/VarCheckUefiLib/VarCheckUefiLib.inf > + NULL|Drivers/OpTeeRpmb/FixupPcd.inf > + } > + > +################################################################################################### > +# > +# BuildOptions Section - Define the module specific tool chain flags that should be used as > +# the default flags for a module. These flags are appended to any > +# standard flags that are defined by the build process. They can be > +# applied for any modules or only those modules with the specific > +# module style (EDK or EDKII) specified in [Components] section. > +# > +################################################################################################### > +[BuildOptions.AARCH64] > +GCC:*_*_*_DLINK_FLAGS = -z common-page-size=0x1000 -march=armv8-a+nofp > +GCC:*_*_*_CC_FLAGS = -mstrict-align > diff --git a/Platform/StMMRpmb/PlatformStandaloneMm.fdf b/Platform/StMMRpmb/PlatformStandaloneMm.fdf > new file mode 100644 > index 0000000000..febc6d0d95 > --- /dev/null > +++ b/Platform/StMMRpmb/PlatformStandaloneMm.fdf > @@ -0,0 +1,111 @@ > +# > +# Copyright (c) 2018, ARM Limited. All rights reserved. > +# Copyright (c) 2020, Linaro Ltd. All rights reserved. > +# > +# SPDX-License-Identifier: BSD-2-Clause-Patent > +# > + > +################################################################################ > +# > +# FD Section > +# The [FD] Section is made up of the definition statements and a > +# description of what goes into the Flash Device Image. Each FD section > +# defines one flash "device" image. A flash device image may be one of > +# the following: Removable media bootable image (like a boot floppy > +# image,) an Option ROM image (that would be "flashed" into an add-in > +# card,) a System "Flash" image (that would be burned into a system's > +# flash) or an Update ("Capsule") image that will be used to update and > +# existing system flash. > +# > +################################################################################ > + > +[FD.BL32_AP_MM] > +BaseAddress = 0x1000 # any address apart from 0x0 > +Size = 0x00300000 > +ErasePolarity = 1 > + > +BlockSize = 0x00001000 > +NumBlocks = 0x0300 > + > +################################################################################ > +# > +# Following are lists of FD Region layout which correspond to the locations of different > +# images within the flash device. > +# > +# Regions must be defined in ascending order and may not overlap. > +# > +# A Layout Region start with a eight digit hex offset (leading "0x" required) followed by > +# the pipe "|" character, followed by the size of the region, also in hex with the leading > +# "0x" characters. Like: > +# Offset|Size > +# PcdOffsetCName|PcdSizeCName > +# RegionType > +# > +################################################################################ > + > +0x00000000|0x00280000 > +FV = FVMAIN_COMPACT > + > +[FV.FVMAIN_COMPACT] > +FvAlignment = 8 > +ERASE_POLARITY = 1 > +MEMORY_MAPPED = TRUE > +STICKY_WRITE = TRUE > +LOCK_CAP = TRUE > +LOCK_STATUS = TRUE > +WRITE_DISABLED_CAP = TRUE > +WRITE_ENABLED_CAP = TRUE > +WRITE_STATUS = TRUE > +WRITE_LOCK_CAP = TRUE > +WRITE_LOCK_STATUS = TRUE > +READ_DISABLED_CAP = TRUE > +READ_ENABLED_CAP = TRUE > +READ_STATUS = TRUE > +READ_LOCK_CAP = TRUE > +READ_LOCK_STATUS = TRUE > + > + INF StandaloneMmPkg/Core/StandaloneMmCore.inf > + INF Drivers/OpTeeRpmb/OpTeeRpmbFv.inf > + INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteStandaloneMm.inf > + INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableStandaloneMm.inf > + INF StandaloneMmPkg/Drivers/StandaloneMmCpu/AArch64/StandaloneMmCpu.inf > +################################################################################ > +# > +# Rules are use with the [FV] section's module INF type to define > +# how an FFS file is created for a given INF file. The following Rule are the default > +# rules for the different module type. User can add the customized rules to define the > +# content of the FFS file. > +# > +################################################################################ > + > + > +############################################################################ > +# Example of a DXE_DRIVER FFS file with a Checksum encapsulation section # > +############################################################################ > +# > +#[Rule.Common.DXE_DRIVER] > +# FILE DRIVER = $(NAMED_GUID) { > +# DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex > +# COMPRESS PI_STD { > +# GUIDED { > +# PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi > +# UI STRING="$(MODULE_NAME)" Optional > +# VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER) > +# } > +# } > +# } > +# > +############################################################################ > + > +[Rule.Common.MM_CORE_STANDALONE] > + FILE SEC = $(NAMED_GUID) FIXED { > + PE32 PE32 Align = Auto $(INF_OUTPUT)/$(MODULE_NAME).efi > + } > + > +[Rule.Common.MM_STANDALONE] > + FILE MM_STANDALONE = $(NAMED_GUID) { > + SMM_DEPEX SMM_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex > + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi > + UI STRING="$(MODULE_NAME)" Optional > + VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER) > + } > -- > 2.17.1 >